This volume presents papers from a DIMACS workshop on network threats. The workshop brought together computer scientists (theorists and practitioners) working in this area to discuss topics such as network security, prevention and detection of security attacks, modeling threats, risk management, threats to individual privacy, and methods of security analysis. The book demonstrates the wide and diverse range of topics involved in electronic interactions and transactions-including the less desirable aspects: security breaches. The volume offers a timely assessment of avoiding or minimizing network threats. Presented here is an interdisciplinary, system-oriented approach that encompasses security requirements, specifications, protocols, and algorithms.The text includes implementation and development strategies using real-world applications that are reliable, fault-tolerant, and performance oriented. The book would be suitable for a graduate seminar on computer security. It features: discussion of Internet, Web and Java security; information on new attacks and weaknesses; and formal and informal analysis methods to identify, quantify, and combat security threats.
"Sinopsis" puede pertenecer a otra edición de este libro.
This volume presents papers from a DIMACS workshop on network threats. The workshop brought together computer scientists (theorists and practitioners) working in this area to discuss topics such as network security, prevention and detection of security attacks, modeling threats, risk management, threats to individual privacy, and methods of security analysis. The book demonstrates the wide and diverse range of topics involved in electronic interactions and transactions - including the less desirable aspects: security breaches. The volume offers a timely assessment of avoiding or minimizing network threats. Presented here is an interdisciplinary, system-oriented approach that encompasses security requirements, specifications, protocols, and algorithms. The text includes implementation and development strategies using real-world applications that are reliable, fault-tolerant, and performance oriented. The book would be suitable for a graduate seminar on computer security.
"Sobre este título" puede pertenecer a otra edición de este libro.
EUR 14,87 gastos de envío desde Estados Unidos de America a España
Destinos, gastos y plazos de envíoEUR 20,39 gastos de envío desde Estados Unidos de America a España
Destinos, gastos y plazos de envíoLibrería: Bookmonger.Ltd, HILLSIDE, NJ, Estados Unidos de America
Hardcover. Condición: Fine. Mint condition. Nº de ref. del artículo: mon0000430299
Cantidad disponible: 2 disponibles
Librería: Zubal-Books, Since 1961, Cleveland, OH, Estados Unidos de America
Condición: New. 110 pp., hardcover, new. - If you are reading this, this item is actually (physically) in our stock and ready for shipment once ordered. We are not bookjackers. Buyer is responsible for any additional duties, taxes, or fees required by recipient's country. Nº de ref. del artículo: ZB1315949
Cantidad disponible: 1 disponibles